-
公开(公告)号:US11529960B2
公开(公告)日:2022-12-20
申请号:US16690070
申请日:2019-11-20
发明人: Seok Woo Lee , Duk Soo Kim , Eui Seok Kim , Sang Gyoo Sim , Seung Young Park
IPC分类号: B60W40/09 , G06N3/08 , H04L12/40 , B60R16/023 , G06V20/59
摘要: Provided is a method for detecting a driver's abnormalities based on a CAN (Controller Area Network) bus network communicating with an ECU (Electronic Control Unit) of a vehicle. The method may include: acquiring a CAN bus signal related to an operation of the vehicle from the CAN bus network; extracting a detection vector from the CAN bus signal using an auto encoder; and detecting a driver's abnormality based on the detection vector.
-
公开(公告)号:US20200242081A1
公开(公告)日:2020-07-30
申请号:US16262414
申请日:2019-01-30
发明人: Seok Woo Lee , Duk Soo Kim , Sang Gyoo Sim , Min Woo Nam , Kwon Koo Kwak , Jae Yeon Yoon
IPC分类号: G06F16/176 , G06F16/16 , G06F16/182 , H04L9/06
摘要: Provided are a device and method for sharing big data using a blockchain. The method of sharing big data using a blockchain includes receiving a search condition from a user terminal, searching a blockchain network for metadata meeting the received search condition and acquiring found metadata, acquiring shared data stored in a distributed storage using the acquired metadata, and transmitting the acquired shared data to the user terminal.
-
公开(公告)号:US11922059B2
公开(公告)日:2024-03-05
申请号:US17104531
申请日:2020-11-25
发明人: Myung Woo Chung , Chel Park , Sang Gyoo Sim , Eui Seok Kim , Duk Soo Kim , Seok Woo Lee
CPC分类号: G06F3/0659 , G06F3/0611 , G06F3/0653 , G06F3/067 , H04L63/105 , H04L63/20
摘要: A method of distributedly storing data in a system comprising a plurality of edge nodes communicatively coupled to an end device and a central cloud. The method includes: receiving, by a first edge node, data transmitted by the end device; assigning, by the first edge node, a data tag to received data according to attributes of the received data and duplicating the received data to generate a tagged data copy; and transmitting, by the first edge node, the tagged data copy to at least one second edge node determined by a data distribution policy determined by the central cloud directly or through the central cloud, so that the at least one second edge node store the tagged data copy in a storage.
-
公开(公告)号:US11456878B2
公开(公告)日:2022-09-27
申请号:US17155447
申请日:2021-01-22
发明人: Myung Woo Chung , Hyun Min Choi , Sang Gyoo Sim , Eui Seok Kim , Duk Soo Kim , Seok Woo Lee
摘要: A pseudonym certificate management method, performed by a pseudonym certificate management apparatus interworking with an external server, may comprise: receiving, from the external server, a pseudonym certificate in a state locked based on a root value identifiable only by the external server; periodically receiving an unlocking key for the pseudonym certificate from the external server; activating the pseudonym certificate with the unlocking key; and when the activated pseudonym certificate is abnormal, deactivating the pseudonym certificate.
-
公开(公告)号:US11381489B1
公开(公告)日:2022-07-05
申请号:US17537098
申请日:2021-11-29
发明人: Jin Hyeok Oh , Myung Woo Chung , Sang Gyoo Sim , Duk Soo Kim , Seok Woo Lee
IPC分类号: G06F15/173 , H04L43/10 , H04L67/10
摘要: A data tracking method, which is performed by a data tracking apparatus in an edge cloud environment including at least one edge node communicating with an end device and a central cloud, includes receiving data from the end device by a first edge node, creating, by the first edge node, a tracing history and distributing the data to a plurality of edge nodes so as to allow the plurality of edge nodes to create tracing histories, transmitting the created tracing histories to the central cloud by the first edge node and the plurality of edge nodes, and verifying, by the central cloud, linkability of the tracing histories transmitted to the central cloud, storing the tracing histories, analyzing the tracing histories, and providing a data tracking function.
-
公开(公告)号:US10382835B2
公开(公告)日:2019-08-13
申请号:US15976754
申请日:2018-05-10
发明人: Sang Gyoo Sim , Eui Seok Kim , Duk Soo Kim , Seok Woo Lee , Wan Yeon Lee
摘要: Provided are an apparatus and method for verifying the integrity of a video file. The method includes receiving a video file and model information of a video recording device which is claimed to have recorded a verification-target video, extracting a header structure and a header value of the video file, extracting characteristic information according to the received model information of the video recording device from a characteristic database, and determining whether the extracted characteristic information according to the model information of the video recording device corresponds to the header structure and the header value of the video file.
-
公开(公告)号:US09817969B2
公开(公告)日:2017-11-14
申请号:US14514516
申请日:2014-10-15
发明人: Seok Woo Lee , Sang Gyoo Sim , Duk Soo Kim
CPC分类号: G06F21/554 , H04L63/1416 , H04L63/1425 , H04L63/1433
摘要: There are provided a device for detecting a cyber attack and a method thereof. The device for detecting a cyber attack includes an event receiving unit configured to receive an event generated in at least one user terminal according to a behavior of a user who accesses a web server and uses web services provided from a web page, a model generating unit configured to generate an event model by extracting an event pattern corresponding to a behavior of the user based on the received event, and an attack detecting unit configured to detect whether access of the web server by a specific user terminal is an attack by comparing the event model with an event received from the specific user terminal. Therefore, various forms of cyber attacks are rapidly and accurately detected, and it is possible to provide a security service having high availability and reliability.
-
公开(公告)号:US11438248B2
公开(公告)日:2022-09-06
申请号:US16989617
申请日:2020-08-10
发明人: Seung Young Park , Sang Gyoo Sim , Duk Soo Kim , Seok Woo Lee , Myung Jin Kim , Eui Seok Kim
摘要: An operation method of a communication node in a communication network may comprise receiving CAN signals from a plurality of CAN communication nodes; generating forward input data by performing forward preprocessing on the received CAN signals based on forward sampling times; generating forward mask data for the forward input data and forward time interval data according to the forward sampling times; generating backward input data by performing backward preprocessing on the CAN signals based on backward sampling times; generating backward mask data for the backward input data and backward time interval data according to the backward sampling times; and detecting an abnormal signal among the CAN signals by inputting the forward input data, forward mask data, forward time interval data, backward input data, backward mask data, and backward time interval data into a gated recurrent unit-decay (GRU-D) neural network.
-
公开(公告)号:US11303439B2
公开(公告)日:2022-04-12
申请号:US16432770
申请日:2019-06-05
发明人: Sung Ok Choi , Young In Park , Sang Gyoo Sim , Duk Soo Kim , Seok Woo Lee
摘要: Provided are a method and device for performing authentication using a hardware security module (HSM) in a one machine-to-machine (oneM2M) environment. The method of performing authentication using an HSM in a oneM2M environment includes extracting a symmetric key stored in the HSM using a security application programming interface (API), generating a first value and a second value using the extracted symmetric key, and performing mutual authentication with an M2M enrolment function (MEF) server through transport layer security pre-shared key ciphersuites (TLS-PSK) using the first value and the second value.
-
公开(公告)号:US11336668B2
公开(公告)日:2022-05-17
申请号:US16277478
申请日:2019-02-15
发明人: Seung Young Park , Sang Gyoo Sim , Duk Soo Kim , Seok Woo Lee , Myung Jin Kim
IPC分类号: G06F16/955 , G06F16/958 , H04L29/06
摘要: Disclosed is a method of detecting whether a groupware user's behavior is an abnormal behavior. The method includes acquiring a uniform resource identifier (URI) from the user's behavior, generating a URI sequence from the URI on the basis of a predetermined time interval, preprocessing the URI sequence to generate a primitive URI sequence, calculating a log probability value from the primitive URI sequence, and detecting whether the user's behavior is an abnormal behavior on the basis of the log probability value and a predetermined threshold value.
-
-
-
-
-
-
-
-
-